Applications of Approximation Algorithms to Cooperative Games Kamal Jain 1. INTRODUCTION The Internet, which is intrinsically a common playground for a large number of players with varying degrees of collaborative and selsh motives, naturally gives rise to numerous new game theoretic issues. Computational problems underlying solutions to these issues, achieving desirable economic criteria, often turn out to be NP-hard. It is therefore natural to apply notions from the area of approximation algorithms to these problems. The connection is made more meaningful by the fact that the two areas of game theory and approximation algorithms share common methodology { both heavily use machinery from the theory of linear programming. Various aspects of this connection have been explored recently by researchers [8, 10, 15, 20, 21, 26, 27, 29]. In this paper we will consider the problem of sharing the cost of a jointly utilized facility in a \fair" manner. Consider a service providing company whose set of possible customers, also called users, is U . For each set S U C (S ) denotes the cost incurred by the company to serve the users in S . The function C is known as the cost function. For concreteness, assume that the company broadcasts news of common interest, such as nancial news, on the net. Each user, i, has a utility, u0i , for receiving the news. This utility u0i is known only to user i. User i enjoys a benet of u0i xi if she gets the news at the price xi . If she does not get the news then her benet is 0. Each user is assumed to be selsh, and hence in order to maximize benet, may misreport her utility as some other number, say ui . For the rest of the discussion, the utility of user i will mean the number ui . A cost sharing mechanism determines which users receive the broadcast and at what price. The mechanism is strategyproof if the dominant strategy of each user is to reveal the Address: One Microsoft Way, Redmond, WA 98052, Email: kamalj@microsoft.com. y Address: College of Computing, Georgia Institute of Tech- nology, Atlanta, GA 30332, Email: vazirani@cc.gatech.edu. Research supported by NSF Grant CCR-9820896. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. STOC’01, July 6-8, 2001, Hersonissos, Crete, Greece. Copyright 2001 ACM 1-58113-349-9/01/0007 ... 5.00. $ Vijay V. Vaziraniy true value of her utility. It is said to be group strategyproof if this holds for coalitions as well. A cost sharing mechanism is budget balanced if the total amount it charges from the receivers is same as the cost incurred by the service provider, C (S ). It is ecient if it maximizes, over all subsets, S , the sum of the utilities of users in S minus C (S ). Ideally, one seeks an ecient, budget balanced and group strategyproof cost sharing mechanism. A classical result in game theory [13, 28] shows that such a mechanism does not exist even for a submodular cost function (see Section 2 for formal definitions of these notions). Such a mechanism does not exist even after relaxing the condition of group strategyproofness to just strategyproofness. In view of this limitation, there are two options: sacrice either budget balance or eciency. In the rst case, one can show that if the cost function is nondecreasing and submodular, then there is only one way of maximizing eciency [24]. This is called the marginal cost mechanism. This mechanism is strategyproof, though not group strategyproof. It never creates a budget surplus but can run a decit, and in many cases raises no revenue at all [24]. In the second case, a fundamental theorem of Moulin and Shenker [23, 24] shows that a cross-monotonic cost sharing method (also known as population monotonic allocation scheme, see Section 2 for a denition) gives rise to a budget balance and group strategyproofness cost sharing mechanism. Moreover, if the cost function is submodular, the converse holds as well. A nondecreasing, submodular cost function supports an entire class of cross-monotonic cost sharing methods. It is useful to characterize methods from this class possessing special properties so that the service provider may pick one judiciously. Two well known methods are: 1. Shapley Value [31]: In the context of multicasting (see Section 2), this method distributes the cost of each edge equally among all the users located downstream of the edge. Moulin and Shenker show that this method achieves the lowest worst case loss of eciency over all utility proles [24]. 2. Egalitarian [5]: This method, due to Dutta and Ray, seeks to distribute the cost equally among all the receivers. Mutuswami has shown that assuming all users draw their utility values from the same probability distribution (with some technical restrictions) this method maximizes the expected size of the set served [25]. A cost sharing method is said to satisfy the coalition participation constraint if the total cost share of any subset S of the users is no more than C (S ), i.e., coalition S has no incentive to break o from the grand coalition. only the users in S . Such a cost sharing method is also called weakly cross-monotone. The class of all weakly cross-monotone cost sharing methods corresponding to a given cost function is said to form the core. The classic Bondareva-Shapley Theorem states that the core is nonempty i the cost function satises the covering property (see Section 5 for denition). This allows us to compute an element of -approximate core (see sections 4 and 5). In this paper we rst consider the problem of multicast routing. A tree T containing the source and all possible users is xed. To serve a subset S of the users, information is routed over the subtree of T containing S and the source. Feigenbaum, Papadimitriou and Shenker [8] have recently shown that the marginal cost cost-sharing mechanism can be implemented on this model with the overhead of only two messages per link, thus leading to a linear number of total message, whereas Shapley value requires a quadratic number of messages. They also show that the welfare value of an optimal subtree is NP-hard to approximate within any constant factor. Although this model for multicast routing is widely used, it suers from the drawback that the subtree connecting a certain subset S of receivers may be arbitrarily more costly than the cheapest tree to them. The latter of course is an optimal Steiner tree containing S and the source. Such a tree is NP-hard to compute. In addition, Megiddo [22] has shown that for this game, the core is empty and so there does not even exist a weak cross-monotonic cost sharing method for the optimal Steiner tree. We get around these diculties by turning to approximation algorithms. A well known factor 2 approximation algorithm for Steiner tree is to nd a minimum spanning tree on the required vertices [19]. The minimum spanning tree game has been studied extensively in the literature [2, 11, 12, 17, 18, 16]. Kent and Skorin-Kapov [17] show how to construct a whole class of weak cross-monotonic methods as well as one cross-monotone method for this game. For the latter result, they use matroid properties of spanning trees. Using the primal-dual minimum spanning tree algorithm of Edmonds [6], we show how to construct a class of cross-monotone methods. These methods are parameterized by n mappings, fi : R+ ! R+ , one for each user, i. The service provider now has a choice of methods. For instance, he could use his estimates of the probability distribution functions of users' utilities as the mappings. In a forthcoming paper [14] we build on the above idea of running a primal-dual-type algorithm and distributing costs according to n mappings for constructing a class of cross-monotonic cost sharing methods for an arbitrary nondecreasing submodular function. We also present a broader notion of egalitarianism motivated by the following: If individual users have widely varying nancial resources then the egalitarian method of Dutta and Ray does not equalize their opportunity of receiving the service. We introduce the notion of opportunity egalitarianism which attempts to do this. We show how a service provider can attempt to equalize, among the users, the opportunity of their getting the service, based on his estimate of their individual resources. The basic technique underlying our method also enables us to generalize Mutuswami's result: we give an algorithm that maximizes the expected size of the set served even if indi- vidual utilities are drawn from dierent probability distributions. In Section 4 we point out a shortcoming of the condition of budget balance, and propose the -approximate budget balance condition. We use the cost sharing methods derived for Steiner tree to give a 2-approximate budget balanced group strategyproof cost sharing mechanism for the metric TSP game (see Section 4), and leave the open problem of deriving a factor 1.5 solution, using Christofedes' algorithm. Core allocation functions for the metric and Euclidean TSP games have been given by Faigle, Fekete, Hochstattler, and Kern [7] and Fekete and Pulleyblank [9], respectively. Several NP-hard minimization problems admit a constant factor approximation algorithm based on an LP-relaxation that is a covering program (e.g., see [32]). In Section 5 we study general approaches for analyzing games based on such problems. We show that the cost function given by an optimal solution to a covering linear program satises the covering property (see Section 5 for denitions). We further show that it admits an eciently computable approximate weakly cross-monotonic cost sharing method. Perhaps a stronger result holds { that in fact it admits a cross-monotonic cost sharing method. We leave this as an (important) open problem. If this open problem is settled positively, it will lead to a general scheme for obtaining a polynomial time computable -approximate budget balanced group strategyproof cost sharing mechanism for such games. Finding such a method for the facility location game seems particularly interesting. Recently, Goemans and Skutella [10] have studied this game and have a core allocation in case the well known LP-relaxation, due to Balinski [1], has an integral solution. Finally, we consider the purely combinatorial question of characterizing the space of cross-monotone methods corresponding to a given nondecreasing submodular function. We show that this is a polyhedron and characterize a subset of its corner points. We leave the open problem of characterizing the rest of the corner points. 2. THE MODEL Let us describe the model in the context of multicast routing. The simplest way of broadcasting a message to many receivers is unicasting, under which the message is individually sent to each receiver. This results in several copies of the same message traversing the network links. This waste of bandwidth could be avoided by using a dierent form of routing, called multicast routing [4]. Multicast routing uses a tree connecting all the receivers to the source. The source sends one copy of the message to each neighboring vertex in the tree. These vertices further act as sources for the downstream receivers. In this manner, a source can reach many receivers without sending multiple copies of a message over any link. Traditionally, a tree containing the source and all possible receivers is xed. The network is then restricted to this tree only. Whenever a message needs to be broadcast to a subset of receivers, multicast routing picks a subtree of this tree. It therefore ignores the high connectivity oered by today's Internet. This is not desirable when the receiver set varies with the message, since the subtree to certain a subset of receivers may be arbitrarily more costly than the cheapest tree to them. When the network is not restricted to a tree, the problem of nding the cheapest multicast tree for a given set of receivers is the well-known Steiner tree problem, which is NP-hard. Although constant factor approximation algorithms are known for the Steiner tree problem, we do not know of any algorithm which gives either a nondecreasing or a submodular cost function. In fact, the optimal solution also does not give a submodular cost function. For example, consider a four cycle with unit cost edges whose vertices are three receivers and the source. The fractional optimal solution to the two well-known linear programming relaxations of the Steiner tree problem, undirected cut formulation and bidirected cut formulation, also does not give a submodular cost function. Let G = (V; E ) be an undirected graph with edge weights ce 's and a marked node root, which is the broadcasting source. All other nodes are users. We denote the set of all users by U . We assume that a message can be duplicated at any node at no cost. Edge e charges the price ce for transporting a message from one end to other. The cost of broadcasting a message is the total price charged by all the edges. We assume that each edge is of innite capacity, so, a message can be sent from node i to node j through the shortest path between them. Hence we assume that ce 's satisfy the triangle inequality. Now, suppose that the root has a message to broadcast and every user i has reported utility ui to the root. The root's job is to come up with the following: 1. a set Q of users, selected to receive the message, 2. a tree T containing Q to broadcast the message, and 3. for each user i, the price xi , to be charged as the cost of delivering the message. For notational convenience we will also represent Q by its indicator function q, i.e., qi = 1 if i 2 Q and qi = 0 otherwise. Now there are computational and economic constraints to be satised. The only computational constraint we are considering in this paper is that only polynomial time is available for computation. The economic constraints are listed below: 1. Optimality. T is an optimum tree connecting all the users in Q with the root. 2. No Positive Transfers (NPT). For each user i, xi 0, i.e., users will not be paid for receiving a message. 3. Voluntary Participation (VP). qi ui xi 0 i.e., if i 62 Q then xi = 0 and if i 2 Q then xi ui i.e., only those users will pay who will receive the message. Moreover, they will never be asked to pay more than their reported utilities. In other words each user has the option to not receive the message, and if so, derives a benet of 0. 4. Consumer Sovereignty (CS). Every user is guaranteed to receive the message if she reports a high enough utility value. 5. Budget-Balance (BB). P P (a) Cost Recovery i2Q xi e2T ce , i.e., the cost of broadcasting the message is recovered from all the users. P P (b) Competitiveness i2Q xi 6 e2T ce , i.e., no surplus is created. Because if any surplus is created then a competitor can deliver the message at a cheaper cost by reducing the surplus. The condition of budget balance consists of P satisfying cost recovery and competitiveness, i.e., i2Q xi = Pboth, e2T ce (the set of users receiving the message pay exactly the total cost of T ). P Pe2T ce is maximized, i.e., as 6. Eciency. i2Q ui much worth is created we want P as possible. Pe2TIdeally Pareto optimal, i.e., i2Q u0i ce to be maximized. But the next condition reduces the latter to the former. 7. Group Strategyproofness. Even if a set of users collude, the dominant strategy for each player is to report her utility value truthfully. To be precise, consider a coalition C of users. Let uj = u0j for all j 62 C . Let (q; x) and (q0 ; x0 ) denote the users served and costs at u and u0 respectively. Now, group strategyproofness requires that if the inequality u0i qi xi u0i qi0 x0i holds for all i 2 C then it must hold with equality for all i 2 C as well, i.e., if no member of C is made worse o by misreporting their utility values then no member of C is made better o either. Satisfying the rst condition is not computationally possible, assuming P 6= NP. We relax it to: the cost of T is within twice the cost of the optimum tree connecting users in Q with the root. A classical result in game theory shows that there is no strategyproof mechanisms that is both budget balance and ecient. Furthermore, Feigenbaum, Papadimitriou and Shenker have shown that it is NP-hard to compute a constant factor approximation to condition 6 as well. So, we are going to put this condition aside. Moulin and Shenker showed that all other economic constraints mentioned above can be captured by a cross-monotonic cost sharing method. A cost function is submodular if 1. C (;) = 0, 2. for any Q1 and Q2 , C (Q1 ) + C (Q2 ) C (Q1 [ Q2 ) + C (Q1 \ Q2 ). It is supermodular if the inequality in the second condition is reversed. A cost function is nondecreasing if for Q1 Q2 , C (Q1 ) C (Q2 ). A cost allocation function f distributes the cost of sending the message U; f (i) 0 P to the entire set of users U , i.e.,of8alli 2cost and i2U f (i) = C (U ). The core consists allocaP tion functions f such that 8S U; i2S f (i) C (S ), i.e., no subset of the users have an incentive to secede. A cost sharing method is a function, , which distributes the cost of broadcasting the message to the recipients. More formally, takes two arguments, a set of users Q and a user i, and returns a nonnegative real number satisfying the following: 1. if i 62 Q then (Q; i) = 0 and P 2. i2Q (Q; i) = C (Q), where C (Q) represents the cost of broadcasting a message to Q. Note that C (Q) is not the optimum cost but it is the cost of the tree T computed for broadcasting the message. A cost sharing method is cross-monotonic if for Q R, (Q; i) (R; i) for everyPuser i 2 Q. ItPis weakly crossmonotonic if for Q R, i2Q (Q;i) i2Q (R; i): As the name suggests, a cross-monotonic method is weakly crossmonotonic as well. Observe that a weakly cross-monotonic method provides us with a core allocation for each subset of the users. For every cross-monotonic cross sharing method, , Moulin and Shenker give the following mechanism M ( ) which computes Q and xi = (Q;i). Mechanism M ( ) 1. Q is initialized to U . 2. if there is a user i in Q with ui < (Q; i) then drop i from Q. Keep repeating this step, in arbitrary order, until for every user i in Q, ui (Q;i). 3. set xi = (Q;i). This mechanism starts with an attempt to send message to all users, and uses to determine the cost share of each user. It drops, in arbitrary order, any user who cannot pay for receiving the message. The mechanism iterates until it a set of users who can together pay for the cost of the tree needed to serve them. Because of cross-monotonicity of , the eventual set of users left does not depend on the order in which individual users are dropped. Since in every step at least one user is dropped, the mechanism will stop in a linear number of iteration. Theorem 1. [24, 23] For any cross monotonic cost sharing method , the mechanism M ( ) is budget balanced, meets NPT, VP, CS and is group strategyproof. As shown in [23, 24], the converse of Theorem 1 holds for any submodular function. For completeness, we provide a (slightly simpler) proof of group strategyproofness. All other conditions are easy to verify. Proof. We will show that M ( ) is group strategyproof, for a cross monotonic cost sharing method . Let u0 be the true utility prole. Assume a coalition C manipulates at u0 by u (where u0i = ui for all i 62 C ). Consider two runs, R(u0 ) and R(u) of the above mechanism with true and false utility values respectively. Let Q0 and Q be the output sets produced by the two runs, and q0 and q be the vectors representing these sets. Assume further that for each i 2 C , the inequality u0i qi xi u0i qi0 x0i (1) holds. We will show that for each i 2 C , this inequality must hold with equality, thereby showing that M ( ) is group strategyproof. In an iteration of M ( ), there could be several users, i, satisfying ui < (Q; i). Since is cross monotonic, the nal outcome does not depend on the manner in which a user is picked to be dropped. Each of the runs R(u0 ) and R(u) makes these choices in an arbitrary (and uncorrelated) manner. Let s1 ; s2 ; : : : ; sk be the order in which users were dropped in run R(u0 ). We will rst prove, by contradiction, that Q Q0 . Let si be the rst user in the list s1 ; s2 ; : : : ; sk such that si 2 Q. By the choice of i, each of the users s1 ; : : : ; si 1 has been dropped in run R(u), and so U fs1 ; : : : ; si 1 g Q. Now, by cross monotonicity of , (U fs1 ; : : : ; si 1 g; si ) (Q; si ). Since si is dropped in run R(u0 ) and retained in run R(u), u0si < (U fs1 ; : : : ; si 1 g; si ), and (Q; si ) usi . Now, there are two cases. If si 2= C , by assumption, u0si = usi . But the above inequalities give u0si < usi , thereby leading to a contradiction. The second case is that si 2 C . Since qs0 i = 0 and qsi = 1, by (1), u0si (Q; si ). But the above inequalities give u0si < (Q; si ), again leading to a contradiction. Hence, Q Q0 . Now, by cross monotonicity of , the price paid by any member of C in the second run must be at least the price paid in the rst run, i.e., 8i 2 C; (Q; i) (Q0 ; i). Hence, for each i 2 C , (1) must hold with equality. 3. THE STEINER TREE GAME In this section, we will give a class of cost-sharing methods for multicasting that achieves budget balance and is crossmonotone, and for any set Q of users chosen for distribution, nds a tree of cost at most twice the optimal Steiner tree containing the root and users Q. Our method utilizes the following two well known facts. If the edge costs satisfy the triangle inequality, the cost of a minimum spanning tree on the set of required vertices is within twice the cost of an optimal Steiner tree containing all required vertices. There is an exact linear programming relaxation for the minimum spanning tree problem, i.e., a relaxation that always has optimal integral solutions. The rst fact is due to [19]. The second follows from a more general fact due to Edmonds: that there is an exact relaxation for the minimum branching problem. In this problem, we are given a directed graph with nonnegative costs on the directed edges, and one of the vertices is marked as root. The problem is to nd a minimum cost tree containing all vertices and directed into the root. The transformation from the minimum spanning tree problem in an undirected graph to the minimum branching problem is straightforward. Simply replace each undirected edge e = (u; v) of G by two directed edges (u ! v) and (v ! u) each of cost ce , and ask for a minimum cost branching directed into the root. Let us denote this directed graph by H = (V; E~ ). Once the branching is found, we ignore directions on edges to obtain a minimum spanning tree in G. Let us say that a set S V is valid if it is nonempty and does not contain the root. For any set S V and F E~ let (S ) = f(u ! v) 2 E~ j u 2 S and v 2 S g, and F (S ) = f(u ! v) 2 F j u 2 S and v 2 S g. We state below the LP-relaxation and dual. minimize subject to Xc x 2 (2) e e X ~ e E 2 e: e (S ) xe 0; xe 1 ; 8 valid set S e 2 E~ maximize subject to X valid set S X 2 S : e (S ) y S ce yS 0 (3) yS e 2 E~ 8 valid set S Let us say that edge e feels dual yS if yS > 0 and e 2 (S ). Say that edge e is tight if the total amount of dual it feels equals its cost. The dual program is trying to maximize the sum of the dual variables yS subject to the condition that no edge feels more dual than its cost, i.e., no edge is over-tight. We present Edmonds' algorithm below, which is based on the primal-dual schema. Starting with the trivial primal and dual solutions, it iteratively improves the feasibility of the primal and the optimality of the dual. When an edge becomes tight, it is included in the ordered list F . In any iteration, a set S V is said to be unsatised if it is valid and F (S ) = ;. Any minimal unsatised set is said to be active. It is easy to see that active sets must be disjoint and must be strongly connected w.r.t. F . For the purpose of proving properties of this algorithm, we will associate a notion of time with the algorithm. In unit time, the algorithm grows duals a unit amount. In an iteration, the algorithm nds all active sets, and raises their dual variables until a new edge, say e, goes tight. At this point, the current iteration ends, and edge e is appended to the list F . The algorithm continues until there are no more unsatised sets. At this point, the algorithm prunes F using the procedure of reverse delete. The edges that remain in F form a branching directed into the root. Algorithm 2 (Minimum branching) 1. (Initialization) F ;; for each S V , yS 0. 2. (Edge augmentation) While there exists an unsatised set do: Find all active sets w.r.t. F. For each such set S, raise its dual variable yS until some edge e goes tight; F F [ feg. 3. Let e1 ; e2 ; : : : ; el be the ordered list of edges in F. 4. (Reverse delete) For j = l downto 1 do: If there are no unsatised sets w.r.t. F fej g, then F F fej g. 5. Return F . Because the algorithm raises dual variables only for strongly connected sets, and does a reverse delete in the end, it is possible to show that every valid dual S such that yS > 0, must satisfy jF (S )j = 1. This, and the fact that only tight edges are picked lead to showing that the cost of the branching picked is precisely equal to the total dual raised, i.e., Xc 2 e F e = X valid set S yS : This important fact shows that the branching found by the algorithm is optimal. As a consequence, we get that LP (2) always has an integral optimal solution. This fact will also enable us to show that our cost-sharing method is budget balanced. Let Q be the set of recipients. We are provided with functions fi : R+ ! R+ , one for each user i. Use Algorithm 2 to nd a minimum spanning tree containing Q and the root. We now dene the cost-sharing method . The cost share for user i 2 Q is computed as follows. Let T denote the rst time at which there is a path from i to the root consisting of tight edges. At time t T , let S (t) denote the set of vertices reachable from i using tight edges. At each time t < T , the algorithm grows the dual variable yS(t) at unit rate. Let F (t) = X f (t): j 2 j S (t) Dene the cost share for user i, (Q; i) = Z T 0 fi (t) dt: F (t) Theorem 3. The cost-sharing method, , is cross-monotonic. Proof. Observe that at each time, the cost-sharing method is simply distributing the growing dual yS(t) among the users in S (t). Since the total dual constructed equals the cost of the tree found, X (Q;i) = C (Q): 2 i Q Consider a run of Algorithm 2 on the set of users Q and let w 2= Q be another user. Let i 2 Q be an arbitrary user. Let R and R0 be the runs of Algorithm 2 on input Q and Q [ fwg, respectively. Let S (t) and S 0 (t) be the sets of vertices reachable from i via tight edges at time t in runs R and R0 , respectively. Dene F (t) = X f (t) and F 0 (t) = j 2 j S (t) X 2 fj (t): j S 0 (t) Let T and T 0 be the rst times at which there is a tight path from i to the root in run R and R0 , respectively. Then, (Q; i) = Z T 0 fi (t) dt; F (t) and (Q [ fwg; i) = Z 0 T 0 fi (t) F 0 (t) dt: If i can reach w in run R0 at time t, then S 0 (t) S (t), and otherwise S (t) = S 0 (t). Therefore, for all t, F 0 (t) F (t). Furthermore, i reaches the root at the same time or earlier in run R0 than in run R, i.e., T 0 T . Hence, (Q [fwg;i) (Q; i). For purposes of eciency, Algorithm 2 is rst run to determine the duals grown, and for each dual, the time at which it started and stopped growing. Since the duals grown form a laminar family, their number is bounded by 2n. This information is sucient for cost allocation. If the functions fi are simple, the cost shares can be computed in closed form; otherwise, one will have to use numerical methods. Corollary 4. For the cost sharing method given above, the mechanism M ( ) is budget balanced, meets NPT, VP, CS, and is group strategyproof. If all the functions fi are the same, we get the cost-sharing method of Kent and Skorin-Kapov. This corresponds to distributing each dual yS equally among the users in the set S. Are all possible cross-monotone cost sharing methods for minimum spanning trees captured by the algorithm given above? We give an example to show that the answer to this question is \No". Consider a network on 3 vertices, root, u and v. Let the distances be (root;u) = 1, (u; v) = 1 and (root; v) = 2. Consider the cross-monotone cost-sharing method (fug; u) = 1, (fvg; v) = 2, (fu; vg; u) = 0 and (fu; vg; v) = 2. When run with vertices u and v, our algorithm will assign a nonnegative cost to vertex u. Hence, it will never generate this cost-sharing method. 4. RELAXING THE BUDGET BALANCE CONDITION Clearly, the cost sharing method should be such that the service provider does not run into a decit. In the presence of competition, it should not create a large surplus either. Budget balance ensures both these conditions, in a mathematically clean manner. However, this is a dicult condition to ensure. Moreover, even when satised, it can suer from the following aw. Let us consider our Steiner tree solution. We assumed that we were provided with a complete graph, G, with edge costs satisfying the triangle inequality, and found a tree T in it. However, the original network, H , may not have links connecting all pairs of nodes. Graph G is obtained by taking the closure of H , so that edges in G correspond to shortest paths in H . Mapping tree T back to H involves replacing edges by paths. This gives rise to a spanning graph, say H 0 , which in general contains cycles and multiple edges. Now, budget balance requires the broadcasting company to send a message on each link of H 0 , which is clearly wasteful. Any spanning tree that is a subgraph of H 0 , say T 0 , suces. This aw and the general diculty of ensuring budget balance motivate the following denition. Let OPT(Q) denote the optimal cost function for serving users Q and let 1 be a constant. (In general, may be a function of n { for this paper, let us assume it is a constant.) is an -approximate cost sharing method if it satises the following: 1. -approximate Competitiveness 8Q U : Pi2Q (Q; i) OPT(Q), i.e., any set Q of users together pays at most times the optimum cost of serving Q. P 2. Cost Recovery 8Q U : i2Q (Q; i) C (Q), for some feasible solution of cost C (Q), i.e., the cost incurred by the service provider is recovered from the users served. 3. if i 62 Q then (Q; i) = 0. is cross-monotonic if for Q R, (Q; i) (R; i) for user i 2 Q. P It is weakly cross-monotonic if for Q R, Pevery i2Q (Q; i) i2Q (R; i). It is said to be eciently computable if for any Q, both C and are polynomial time computable. A cost sharing mechanism is -approximate budget balanced if it is -approximate competitive and cost recovering. One can easily obtain the following along the lines of Moulin and Shenker's Theorem 1. Theorem 5. For any -approximate cross-monotonic cost sharing method , mechanism M ( ) is -approximate budget balanced, meets NPT, VP, CS and is group strategyproof. Furthermore M ( ) is eciently computable if is. Under these denitions, tree T 0 is a 2-approximate budget balanced solution. Let us illustrate another use of this notion. Consider the metric TSP game, in which edge costs between nodes satisfy the triangle inequality, and a traveling salesman starts at node 1 and executes a tour, visiting a set of users that are chosen by the cost sharing mechanism. Recall that doubling an MST, nding an Eulerian tour and short cutting gives a factor 2 approximation algorithm for metric TSP. Using this fact and Theorem 3 we get. Theorem 6. There is a 2-approximate budget balanced group strategyproof cost sharing mechanism for the metric TSP game. An -approximate cost allocation function f is an -approximate competitive and cost recovering way of serving the entirePset of users U , i.e., 8i 2 U; f (i) 0 and OPT(U ) i2U f (i) C (U ). The -core consists of all -approximate cost allocation functions f such that 8S P U; i2S f (i) OPT(S ). Clearly, an -approximate weakly cross-monotonic cost sharing method yields an -approximate cost allocation function for each subset of users. A shortcoming of the notion of core is that it turns out to be empty for many games. We hope that the relaxed notion introduced above will alleviate this diculty. Remark : In the denition of -approximate weakly crossmonotonic sharing Pi2Q (Q; icost P method, replacing P the condition ) i2Q (R;i) by i2Q (R; i) OPT(Q) would have lead to a weaker, though still potentially useful, denition. 5. A GENERAL APPROACH Next, we present an open problem, whose positive resolution would lead to a general technique for obtaining an approximate budget balanced group strategyproof cost sharing method for several games based on NP-hard problems. For the time being, we can construct -approximate core allocations for these games. Let us rst present some denitions. A fractional set, S , is a set in which an element can appear partially i.e., with each element, e, there is a number fS (e) 2 [0; 1], which tells the extent of appearance of e in set S . The union of two fractional sets, S1 and S2 , is denoted by S1 [ S2 and is dened by the function fS1 [S2 = minffS1 + fS2 ; 1g: If S is a set and f 2 [0; 1] then f S is a fractional set where each element in S appears to the extent of f in f S . Fractional sets S1 ; S2 ; : : : ; Sn cover S if S1 [ S2 [ : : : [ Sn = S . Suppose U is the set of all users and C : 2U ! R+ is a cost function. C is said to exhibit the covering property if forSany set S of users and any P covering of S of the form S = j fj Sj , we have C (S ) j fj C (Sj ), where each Sj is a set of users. The classic Bondareva-Shapley Theorem [3, 30] shows that a necessary and sucient condition for the existence of a weakly cross-monotonic cost sharing method is that the underlying cost function exhibit the covering property. Does a cost function satisfying the covering property always admit a cross-monotonic cost sharing method? A positive resolution will lead to the following general scheme. A covering linear program is a minimization linear program in which all coecients in the constraint matrix and the objective function are nonnegative. Let L be a covering linear program. The feasible region of homogenous linear inequalities is called a cone. A cone that lies in the nonnegative orthant will be called a nonnegative cone. Consider the feasible solutions of L that lie in a nonnegative cone C . Corresponding to each user is a set of constraints of the linear program. For instance, in case of the minimum spanning tree LP, the constraints corresponding to a user i corresponds to sets S V containing i but not the root. Each user has a utility value to get the corresponding constraints satised. This utility value can be misreported. Let Ci be the set of constraints corresponding to a user Si. The set of constraints corresponding to the users in Q is i2Q Ci . The cost, C (Q), for serving Q is the optimum objective function S value of a solution that satises all constraints in i2Q Ci and lies in C . Without loss of generality we assume that each set of constraints corresponds to a user. Lemma 7. For any covering LP L and nonnegative cone C , the cost function as dened above exhibits the covering property. Sf j 's are j j Sj , where S and SP sets of users. We want to establish that C (S ) j fj C (Sj ). Consider the right hand side. Let xj be an optimal solution for satisfying and lying in P all the constraints inC Sasj well. cone C . Clearly, j fj xj lies in the cone Hence, P the lemma is proven if we show that j fj xj serves all the users in S . Consider a user i in S . User i is served if all the constraints in Ci are satised. Consider a constraint, say aT x b, in Ci . Note that there is no negative coecient in a or b. Also P we have restricted x to nonnegative C. Pj:i2Scone T T P T Therefore, a f f x = f j xj a ja j j :i2Sj j j j xj Pj:i2Sj fj b b, where theSlast inequality follows from that i is covered in j fj Sj . This shows that Pthej ffact j xj satises all the users in S . The cost of the optimum way to satisfy all users in S , C (S ), can only be smaller. Proof. Suppose S = Consider an NP-hard minimization problem for which an factor approximation algorithm is obtained using an LP-relaxation as a lower bound, i.e., the cost of the solution found is at most times an optimal solution to the LP. Furthermore, assume that this LP, P , is a covering LP, L, intersected with a nonnegative cone C . (In most cases C will simply be the nonnegative orthant. As shown below, for facility location, a dierent cone is required.) If our open problem resolves positively, the optimal cost function for LP P admits a cross-monotonic cost sharing method. Multiplying by gives us an -approximate budget balanced group strategyproof cost sharing mechanism. Using Lemma 7 and the Bondareva-Shapley Theorem [3, 30] one can show that there exists an -approximate weakly cross monotonic cost sharing method for . However, their theorem uses an exponential sized LP which may be solvable in polynomial time in particular cases, though not in general. The following theorem gives a way of nding one such method eciently. Theorem 8. There is an eciently computable -approximate weakly cross-monotonic cost sharing method for . Proof. We may assume w.l.o.g. that there is a unique inequality in L corresponding to each user and that the constant in this inequality is 1. The latter is easily ensured by scaling. Suppose the former is not satised for user i. Consider the inequalities corresponding to user i. Pick a new variable xi and replace each inequality aT x b by the homogenous inequality aT x bxi . These homogenous inequalities can be pushed into the cone. Further, add the inequality xi 1 in L. Clearly the new LP is equivalent to the old one. Let D be the dual linear program for P . For subset Q of users, let P Q be the restriction of P to inequalities corresponding to Q only (of course retaining all of C ). Let DQ denote the dual of P Q . Consider the following cost sharing method. Let yQ denote an optimal solution to LP DQ . The cost share of user i 2 Q is (Q; i) = yQ (i). If i 2= Q, then (Q; i) = 0. Let OPTf (Q) denote the objective function value of solution yQ . This cost P sharing method is -approximate competitive because i2Q (Q; i) = OPTf (Q) OPT(Q). It satises cost recovery because the cost of the solution produced by the factorPapproximation algorithm for is C (Q) OPTf (Q) = i2Q (Q; i). Finally, let us show that it satises weak cross-monotonicity. Let Q R. Let yR be an optimal solution to LP DR . Let y0 denote the restriction of yR to coordinates correspond-0 ing to users in Q. The important observation is that y is a feasible solution to DQ . Since the optimal solution to DQ can have only a higher objective function value, weak cross-monotonicity follows. Let us show how Lemma 7 helps overcome some of the diculties in obtaining a group strategyproof cost sharing method for the facility location game. In this game, we are given a set of cities and a set of potential sites for opening facilities. For each site, we are given the cost of opening a facility there. For each city and site we are given the cost of connecting the city to a facility opened at that site. These connection costs satisfy the triangle inequality. In this setting cities are users who want themselves to be connected to an open facility. Each user reports a utility for being connected to an open facility. The cost of serving a set of users is the total cost of opening facilities and connecting each city in the set to one of the open facilities. One diculty is that the optimal solution does not admit a weakly cross-monotonic cost sharing method (and hence no cross-monotonic method either). The reason is that the optimal cost function does not exhibit the covering property. For an instance, consider a cycle on 6 vertices, with 3 cities and 3 facilities alternating. The cost of each edge is 1 and the cost of opening each facility is 2. A well known LP-relaxation for this problem, due to Balinski [1], is given below. Several constant factor approximation algorithms are based on this relaxation. Suppose C is the set of cities and F is the set of facilities. Suppose fi is the cost of opening facility i and cij is the cost of connecting city j to facility i. In the corresponding integer program, yi is a 0=1 variable which is 1 i facility i is open, and xij be a 0=1 variable which is 1 i city j is connected to facility i. min (S; i) = C (S ) C (S fig): Proof. By the cross-monotonicity of , max (S; i) C (i). Furthermore, this value is attained for the incremental cost-sharing method based on any permutation such that (1) = i. Applying cross-monotonicity to S fig, we get that min (S; i) C (S ) C (S fig): This value is attained for the incremental cost-sharing method (4) based on any permutation such that (n) = i. cij xij minimize i i i2F j 2C;i2F This leads to the following question regarding the miniX mum spanning tree game: what is the complexity of comsubject to xij 1; 8j 2 C puting the minimum and maximum, over all cross-monotone i2F cost-sharing methods, of the cost-share of an individual user yi xij 0; 8j 2 C; 8i 2 F in a given coalition? This problem appears to be NP-hard. Let be a cross-monotone cost-sharing method for C . xij 0; i 2 F;j 2 C Represent as a point in n2n 1 dimensional real space yi 0; i2F whose coordinates are indexed by pairs (Q; i), where Q U and i 2 Q. Consider in this space the set of all crossmonotone cost-sharing methods for C . This set is a polyThis LP has negative coecients and so it is not a covtope, since it can be described by the following linear system ering LP. Note that last three sets of constraints dene a on n2n 1 variables x(Q; i) where Q U and i 2 Q. nonnegative cone. Let us call it C . We can rewrite this LP as follows: X x(Q; i) = C (Q); 8Q U X X i2Q minimize cij xij + fi yi (5) j 2C;i2F i2F x(Q; i) x(Q0 ; i); 8Q0 U; Q Q0 ; i 2 Q X xij 1; x(Q; i) 0; 8Q U; i 2 Q 8j 2 C subject to i2F Proposition 10. Each incremental cost sharing method C for C is a corner points of the polytope described above. Therefore, by Lemma 7, the optimal solution to BalinProof. Suppose is not a corner point of the polyski's LP satises the covering property. This opens the tope. In this case it can be written as the convex compossibility of nding a constant factor approximate budget balanced and group strategyproof method for the facility bination of two other cross-monotonic cost-sharing methods, a and b . We claim that a , b and are the same. location game. Suppose not. Then there exists Q U and (i) 2 Q such that a (Q; (i)) 6= (Q; (i)) 6= b (Q; (i)). Let us 6. CHARACTERIZING pick the smallest such i. Without loss of generality asCROSS-MONOTONIC METHODS sume that a (Q; (i)) < (Q; (i)) < b(Q; (i)). Let Q0 = f(j ) : j ig \ Q. Since is an incremental costLet C be a nondecreasing submodular cost function over sharing method, the user set U = f1; 2; : : : ; ng. In this section we will study the space of all cross-monotone cost-sharing methods for C X (Q; (j)) = C (Q0): as well as the smallest and largest cost shares allocated by such methods to a specic user in a specic coalition. (j )2Q We rst dene some special cost sharing methods. Let be a permutation on 1; : : : ; n. The incremental cost sharing Therefore, method is dened as follows. Let S U . Assume jS j = k, X b(Q; (j)) > C (Q0): and let i1 ; : : : ; ik be the users in S , ordered according to . The cost shares assigned to these users by are: (S; i1 ) = (j )2Q C (i1 ), and for 2 j k, (S; ij ) = C (fi1 ; : : : ; ij g) C (fi1 ; : : : ; ij 1 g). This contradicts the cross-monotonicity of b . Proposition 9. Let S U and i 2 S . Among all crossDo all the corner points of the polytope correspond to inmonotone cost-sharing methods for C , cremental cost-sharing methods? The following cross-monotone cost-sharing method cannot be written as a convex combinamax (S; i) = C (i) and tion of incremental cost-sharing methods, thereby showing X X + fy 0 0 that the answer to this question is \No". (fa; b; cg; a) = 2, (fa; b; cg;b) = 3, (fa; b; cg; c) = 4, (fa; bg; a) = 4, (fa; bg; b) = 3, (fa; cg; a) = 3, (fa; cg; c) = 4, (fb; cg; b) = 3, (fb; cg; c) = 4, (fag; a) = 4, (fbg; b) = 4, (fcg;c) = 4. Observe that the cost function of this example is particularly simple: it assigns costs to sets based only on their cardinality. Let us call such a cost function a cardinality cost function. We leave the open problem of characterizing the rest of the corner points of this polytope. The special case of a cardinality cost function is also interesting. 7. ACKNOWLEDGEMENTS We wish to thank Daniel Granot, Herve Moulin, Suresh Mutuswami, Christos Papadimitriou, and Scott Shenker for valuable comments and for providing pointers into the literature. 8. REFERENCES [1] M. L. Balinski. On nding integer solutions to linear programs. In Proc. IBM Scientic Computing Symp. on Combinatorial Problems, pages 225{248, 1966. [2] C. Bird. On cost allocation for a spanning tree: a game theoretic approach. Networks, 6:335{350, 1976. [3] O. N. Bondareva. Some applications of linear programming to cooperative games. Problemy Kibernetiki, 10:119{139, 1963. [4] S. Deering and D. Cheriton. Multicast routing in datagram internetworks and extended lans. ACM Transactions on Computer Systems, 8:85{110, 1990. [5] B. Dutta and D. Ray. A concept of egalitarianism under participation constraints. Econometrica, 57:615{635. [6] J. Edmonds. Optimum branchings. J. Res. Nat. Bur. Standards, B71:233{240, 1967. [7] U. Faigle, S. Fekete, W. Hochstattler, and W. Kern. On approximation fair cost allocation in euclidean tsp games. In Electronic Colloquium on Computational Complexity, pages TR95{016, 1995. [8] J. Feigenbaum, C. Papadimitriou, and S. Shenker. Sharing the cost of multicast transmission. In Proc. 32th Ann. ACM Symp. on Theory of Comp., 2000. [9] S. P. Fekete and W. R. Pulleyblank. A note on the traveling preacher problem. submitted to, Operations Research Letter. [10] M. Goemans and M. Sketella. Cooperative facility location games. In Proc. 11th annual Symposium on Discrete Algorithm, pages 76{85, 2000. [11] D. Granot and G. Huberman. On minimum cost spanning tree games. Mathematical Programming, 21:1{18, 1981. [12] D. Granot and G. Huberman. On the core and nucleolus of minimum cost spanning tree games. Mathematical Programming, 29:323{347, 1984. [13] J. Green, E. Kohlberg, and J. J. Laont. Partial equilibirium approach to the free rider problem. Journal of Public Economics, 6:375{394, 1976. [14] K. Jain and V. V. Vazirani. Group strategyproof cost allocation under a broader notion of a egalitarianism. In preparation. [15] P. Karp, Koutsoupias and Shenker. Optimization problems in congestion control. In Proceedings of the 41st FOCS, 2000. [16] K. Kent and D. Skorin-Kapov. On the core of the minimum steiner tree game in networks. In Annals of Operation Research, volume 57, pages 233{249, 1995. [17] K. Kent and D. Skorin-Kapov. Population monotonic cost allocation on mst's. In Operational Reearch Proceedings KOI, pages 43{48, 1996. [18] K. Kent and D. Skorin-Kapov. Distance monotonic stable cost allocation scheme for the minimum cost spanning tree network. In Proceedings of the 19th Conference Information Technology Interfaces ITI, pages 463{468, 1997. [19] L. Kou, G. Markowsky, and L. Berman. A fast algorithm for Steiner trees. Acta Informatica, 15:141{145, 1981. [20] Koutsoupias and Papadimitriou. Worst-case equilibria. In Proceedings of STACS, 1998. [21] Kumar and Kleinberg. Fairness measures for resource allocation. In Proceedings of the 41st FOCS, 2000. [22] N. Megiddo. Cost allocation for steiner trees. Networks, 8:1{6, 1978. [23] H. Moulin. Incremental cost sharing: characterization by coalition strategy-proofness. Social Choice and Welfare, 16:279{320, 1999. [24] H. Moulin and S. Shenker. Strategyproof sharing of submodular costs: budget balance versus eciency. http://www.aciri.org/shenker/cost.ps, 1997. [25] S. Mutuswami. Strategyproof mechanism for cost sharing. working paper, Indian statistical Institute. [26] Nisan. Algorithms for selsh agents - mechanism design for distributed computation. In Proceedings of STACS, 1999. [27] Nisan and Ronen. Algorithmic mechanism design. In Proceedings of STOC, 1999. [28] K. Roberts. The characterization of implementable choice rules. In J. J. Laont, editor, Aggregation and Revealation of Preferences, pages 321{348, North Holland, 1979. [29] Roughgarden and Tardos. How bad is selsh routing. In Proceedings of the 41st FOCS, 2000. [30] L. S. Shapley. On balanced sets and cores. Naval Research Logistics Quarterly, 14:453{460. [31] L. S. Shapley. A value of n-person games. In H. Kuhn and W. Tucker, editors, Contributions to the theory of games, pages 31{40. Princeton University Press, 1953. [32] V. V. Vazirani. Approximation Algorithms. Springer Verlag, Berlin, To appear, 2001.